pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 5.21.0a1710888431__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (176) hide show
  1. pulumi_vault/ad/get_access_credentials.py +4 -2
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +6 -2
  4. pulumi_vault/ad/secret_role.py +6 -2
  5. pulumi_vault/alicloud/auth_backend_role.py +6 -2
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +6 -2
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +14 -2
  11. pulumi_vault/audit_request_header.py +4 -0
  12. pulumi_vault/auth_backend.py +2 -2
  13. pulumi_vault/aws/auth_backend_cert.py +6 -2
  14. pulumi_vault/aws/auth_backend_client.py +6 -2
  15. pulumi_vault/aws/auth_backend_config_identity.py +6 -2
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -2
  17. pulumi_vault/aws/auth_backend_role.py +6 -2
  18. pulumi_vault/aws/auth_backend_roletag_blacklist.py +4 -0
  19. pulumi_vault/aws/auth_backend_sts_role.py +6 -2
  20. pulumi_vault/aws/get_access_credentials.py +4 -2
  21. pulumi_vault/aws/secret_backend.py +2 -2
  22. pulumi_vault/aws/secret_backend_role.py +6 -2
  23. pulumi_vault/aws/secret_backend_static_role.py +10 -4
  24. pulumi_vault/azure/auth_backend_config.py +6 -2
  25. pulumi_vault/azure/auth_backend_role.py +6 -2
  26. pulumi_vault/azure/backend.py +12 -0
  27. pulumi_vault/azure/backend_role.py +4 -0
  28. pulumi_vault/azure/get_access_credentials.py +6 -0
  29. pulumi_vault/cert_auth_backend_role.py +4 -0
  30. pulumi_vault/consul/secret_backend.py +14 -2
  31. pulumi_vault/consul/secret_backend_role.py +8 -2
  32. pulumi_vault/database/secret_backend_connection.py +6 -2
  33. pulumi_vault/database/secret_backend_role.py +6 -2
  34. pulumi_vault/database/secret_backend_static_role.py +6 -2
  35. pulumi_vault/database/secrets_mount.py +6 -2
  36. pulumi_vault/egp_policy.py +4 -0
  37. pulumi_vault/gcp/auth_backend.py +6 -2
  38. pulumi_vault/gcp/auth_backend_role.py +6 -2
  39. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  40. pulumi_vault/gcp/secret_backend.py +4 -0
  41. pulumi_vault/gcp/secret_impersonated_account.py +6 -2
  42. pulumi_vault/gcp/secret_roleset.py +6 -2
  43. pulumi_vault/gcp/secret_static_account.py +6 -2
  44. pulumi_vault/generic/endpoint.py +6 -0
  45. pulumi_vault/generic/get_secret.py +6 -6
  46. pulumi_vault/generic/secret.py +2 -2
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +22 -2
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +4 -0
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +6 -2
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +6 -2
  56. pulumi_vault/identity/entity_alias.py +6 -2
  57. pulumi_vault/identity/entity_policies.py +12 -0
  58. pulumi_vault/identity/get_entity.py +6 -0
  59. pulumi_vault/identity/get_group.py +6 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -0
  61. pulumi_vault/identity/get_oidc_openid_config.py +4 -0
  62. pulumi_vault/identity/get_oidc_public_keys.py +4 -0
  63. pulumi_vault/identity/group.py +20 -2
  64. pulumi_vault/identity/group_alias.py +6 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +12 -0
  66. pulumi_vault/identity/group_member_group_ids.py +12 -0
  67. pulumi_vault/identity/group_policies.py +12 -0
  68. pulumi_vault/identity/mfa_duo.py +6 -2
  69. pulumi_vault/identity/mfa_login_enforcement.py +6 -2
  70. pulumi_vault/identity/mfa_okta.py +6 -2
  71. pulumi_vault/identity/mfa_pingid.py +6 -2
  72. pulumi_vault/identity/mfa_totp.py +6 -2
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -2
  75. pulumi_vault/identity/oidc_client.py +6 -2
  76. pulumi_vault/identity/oidc_key.py +6 -2
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +4 -0
  78. pulumi_vault/identity/oidc_provider.py +6 -2
  79. pulumi_vault/identity/oidc_role.py +10 -2
  80. pulumi_vault/identity/oidc_scope.py +6 -2
  81. pulumi_vault/jwt/auth_backend.py +18 -6
  82. pulumi_vault/jwt/auth_backend_role.py +10 -2
  83. pulumi_vault/kmip/secret_backend.py +6 -2
  84. pulumi_vault/kmip/secret_role.py +6 -2
  85. pulumi_vault/kmip/secret_scope.py +6 -2
  86. pulumi_vault/kubernetes/auth_backend_config.py +6 -2
  87. pulumi_vault/kubernetes/auth_backend_role.py +6 -2
  88. pulumi_vault/kubernetes/get_service_account_token.py +4 -0
  89. pulumi_vault/kubernetes/secret_backend.py +6 -2
  90. pulumi_vault/kubernetes/secret_backend_role.py +14 -2
  91. pulumi_vault/kv/get_secret.py +6 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -0
  93. pulumi_vault/kv/get_secret_v2.py +2 -6
  94. pulumi_vault/kv/get_secrets_list.py +6 -0
  95. pulumi_vault/kv/get_secrets_list_v2.py +6 -0
  96. pulumi_vault/kv/secret.py +8 -2
  97. pulumi_vault/kv/secret_backend_v2.py +12 -4
  98. pulumi_vault/kv/secret_v2.py +8 -2
  99. pulumi_vault/ldap/auth_backend.py +6 -2
  100. pulumi_vault/ldap/auth_backend_group.py +6 -2
  101. pulumi_vault/ldap/auth_backend_user.py +6 -2
  102. pulumi_vault/ldap/secret_backend.py +6 -2
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +10 -4
  104. pulumi_vault/ldap/secret_backend_library_set.py +6 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +10 -4
  106. pulumi_vault/managed/keys.py +2 -14
  107. pulumi_vault/mfa_duo.py +6 -2
  108. pulumi_vault/mfa_okta.py +6 -2
  109. pulumi_vault/mfa_pingid.py +6 -2
  110. pulumi_vault/mfa_totp.py +6 -2
  111. pulumi_vault/mongodbatlas/secret_backend.py +6 -2
  112. pulumi_vault/mongodbatlas/secret_role.py +10 -4
  113. pulumi_vault/mount.py +18 -2
  114. pulumi_vault/namespace.py +42 -62
  115. pulumi_vault/nomad_secret_backend.py +6 -2
  116. pulumi_vault/nomad_secret_role.py +6 -2
  117. pulumi_vault/okta/auth_backend.py +6 -2
  118. pulumi_vault/okta/auth_backend_group.py +6 -2
  119. pulumi_vault/okta/auth_backend_user.py +6 -2
  120. pulumi_vault/password_policy.py +6 -2
  121. pulumi_vault/pkisecret/get_backend_issuer.py +4 -2
  122. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  123. pulumi_vault/pkisecret/get_backend_key.py +4 -0
  124. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  125. pulumi_vault/pkisecret/secret_backend_cert.py +4 -0
  126. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -0
  127. pulumi_vault/pkisecret/secret_backend_config_issuers.py +6 -2
  128. pulumi_vault/pkisecret/secret_backend_config_urls.py +12 -4
  129. pulumi_vault/pkisecret/secret_backend_crl_config.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -0
  131. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +4 -0
  132. pulumi_vault/pkisecret/secret_backend_issuer.py +6 -2
  133. pulumi_vault/pkisecret/secret_backend_key.py +2 -2
  134. pulumi_vault/pkisecret/secret_backend_role.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -0
  136. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -0
  137. pulumi_vault/pkisecret/secret_backend_sign.py +6 -0
  138. pulumi_vault/policy.py +2 -2
  139. pulumi_vault/quota_lease_count.py +6 -2
  140. pulumi_vault/quota_rate_limit.py +6 -2
  141. pulumi_vault/rabbitmq/secret_backend.py +6 -2
  142. pulumi_vault/rabbitmq/secret_backend_role.py +6 -2
  143. pulumi_vault/raft_autopilot.py +6 -2
  144. pulumi_vault/raft_snapshot_agent_config.py +111 -16
  145. pulumi_vault/rgp_policy.py +4 -0
  146. pulumi_vault/saml/auth_backend.py +6 -2
  147. pulumi_vault/saml/auth_backend_role.py +6 -2
  148. pulumi_vault/secrets/sync_association.py +4 -0
  149. pulumi_vault/secrets/sync_aws_destination.py +6 -2
  150. pulumi_vault/secrets/sync_azure_destination.py +6 -2
  151. pulumi_vault/secrets/sync_config.py +6 -2
  152. pulumi_vault/secrets/sync_gcp_destination.py +6 -2
  153. pulumi_vault/secrets/sync_gh_destination.py +6 -2
  154. pulumi_vault/secrets/sync_vercel_destination.py +6 -2
  155. pulumi_vault/ssh/_inputs.py +4 -0
  156. pulumi_vault/ssh/outputs.py +4 -0
  157. pulumi_vault/ssh/secret_backend_ca.py +6 -2
  158. pulumi_vault/ssh/secret_backend_role.py +6 -2
  159. pulumi_vault/terraformcloud/secret_backend.py +6 -2
  160. pulumi_vault/terraformcloud/secret_creds.py +4 -0
  161. pulumi_vault/terraformcloud/secret_role.py +6 -2
  162. pulumi_vault/token.py +6 -2
  163. pulumi_vault/tokenauth/auth_backend_role.py +6 -2
  164. pulumi_vault/transform/alphabet.py +4 -0
  165. pulumi_vault/transform/get_decode.py +4 -0
  166. pulumi_vault/transform/get_encode.py +4 -0
  167. pulumi_vault/transform/role.py +4 -0
  168. pulumi_vault/transform/template.py +4 -0
  169. pulumi_vault/transit/get_decrypt.py +4 -0
  170. pulumi_vault/transit/secret_backend_key.py +8 -2
  171. pulumi_vault/transit/secret_cache_config.py +4 -0
  172. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/METADATA +1 -1
  173. pulumi_vault-5.21.0a1710888431.dist-info/RECORD +244 -0
  174. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/WHEEL +1 -1
  175. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  176. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/top_level.txt +0 -0
@@ -661,6 +661,7 @@ class AuthBackendRole(pulumi.CustomResource):
661
661
 
662
662
  ## Example Usage
663
663
 
664
+ <!--Start PulumiCodeChooser -->
664
665
  ```python
665
666
  import pulumi
666
667
  import pulumi_vault as vault
@@ -679,13 +680,14 @@ class AuthBackendRole(pulumi.CustomResource):
679
680
  ],
680
681
  audience="vault")
681
682
  ```
683
+ <!--End PulumiCodeChooser -->
682
684
 
683
685
  ## Import
684
686
 
685
687
  Kubernetes auth backend role can be imported using the `path`, e.g.
686
688
 
687
689
  ```sh
688
- $ pulumi import vault:kubernetes/authBackendRole:AuthBackendRole foo auth/kubernetes/role/foo
690
+ $ pulumi import vault:kubernetes/authBackendRole:AuthBackendRole foo auth/kubernetes/role/foo
689
691
  ```
690
692
 
691
693
  :param str resource_name: The name of the resource.
@@ -744,6 +746,7 @@ class AuthBackendRole(pulumi.CustomResource):
744
746
 
745
747
  ## Example Usage
746
748
 
749
+ <!--Start PulumiCodeChooser -->
747
750
  ```python
748
751
  import pulumi
749
752
  import pulumi_vault as vault
@@ -762,13 +765,14 @@ class AuthBackendRole(pulumi.CustomResource):
762
765
  ],
763
766
  audience="vault")
764
767
  ```
768
+ <!--End PulumiCodeChooser -->
765
769
 
766
770
  ## Import
767
771
 
768
772
  Kubernetes auth backend role can be imported using the `path`, e.g.
769
773
 
770
774
  ```sh
771
- $ pulumi import vault:kubernetes/authBackendRole:AuthBackendRole foo auth/kubernetes/role/foo
775
+ $ pulumi import vault:kubernetes/authBackendRole:AuthBackendRole foo auth/kubernetes/role/foo
772
776
  ```
773
777
 
774
778
  :param str resource_name: The name of the resource.
@@ -180,6 +180,7 @@ def get_service_account_token(backend: Optional[str] = None,
180
180
  """
181
181
  ## Example Usage
182
182
 
183
+ <!--Start PulumiCodeChooser -->
183
184
  ```python
184
185
  import pulumi
185
186
  import pulumi_vault as vault
@@ -211,6 +212,7 @@ def get_service_account_token(backend: Optional[str] = None,
211
212
  cluster_role_binding=False,
212
213
  ttl="1h")
213
214
  ```
215
+ <!--End PulumiCodeChooser -->
214
216
 
215
217
 
216
218
  :param str backend: The Kubernetes secret backend to generate service account
@@ -265,6 +267,7 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
265
267
  """
266
268
  ## Example Usage
267
269
 
270
+ <!--Start PulumiCodeChooser -->
268
271
  ```python
269
272
  import pulumi
270
273
  import pulumi_vault as vault
@@ -296,6 +299,7 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
296
299
  cluster_role_binding=False,
297
300
  ttl="1h")
298
301
  ```
302
+ <!--End PulumiCodeChooser -->
299
303
 
300
304
 
301
305
  :param str backend: The Kubernetes secret backend to generate service account
@@ -623,6 +623,7 @@ class SecretBackend(pulumi.CustomResource):
623
623
  """
624
624
  ## Example Usage
625
625
 
626
+ <!--Start PulumiCodeChooser -->
626
627
  ```python
627
628
  import pulumi
628
629
  import pulumi_vault as vault
@@ -637,13 +638,14 @@ class SecretBackend(pulumi.CustomResource):
637
638
  service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
638
639
  disable_local_ca_jwt=False)
639
640
  ```
641
+ <!--End PulumiCodeChooser -->
640
642
 
641
643
  ## Import
642
644
 
643
645
  The Kubernetes secret backend can be imported using its `path` e.g.
644
646
 
645
647
  ```sh
646
- $ pulumi import vault:kubernetes/secretBackend:SecretBackend config kubernetes
648
+ $ pulumi import vault:kubernetes/secretBackend:SecretBackend config kubernetes
647
649
  ```
648
650
 
649
651
  :param str resource_name: The name of the resource.
@@ -685,6 +687,7 @@ class SecretBackend(pulumi.CustomResource):
685
687
  """
686
688
  ## Example Usage
687
689
 
690
+ <!--Start PulumiCodeChooser -->
688
691
  ```python
689
692
  import pulumi
690
693
  import pulumi_vault as vault
@@ -699,13 +702,14 @@ class SecretBackend(pulumi.CustomResource):
699
702
  service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
700
703
  disable_local_ca_jwt=False)
701
704
  ```
705
+ <!--End PulumiCodeChooser -->
702
706
 
703
707
  ## Import
704
708
 
705
709
  The Kubernetes secret backend can be imported using its `path` e.g.
706
710
 
707
711
  ```sh
708
- $ pulumi import vault:kubernetes/secretBackend:SecretBackend config kubernetes
712
+ $ pulumi import vault:kubernetes/secretBackend:SecretBackend config kubernetes
709
713
  ```
710
714
 
711
715
  :param str resource_name: The name of the resource.
@@ -541,6 +541,7 @@ class SecretBackendRole(pulumi.CustomResource):
541
541
 
542
542
  Example using `service_account_name` mode:
543
543
 
544
+ <!--Start PulumiCodeChooser -->
544
545
  ```python
545
546
  import pulumi
546
547
  import pulumi_vault as vault
@@ -567,9 +568,11 @@ class SecretBackendRole(pulumi.CustomResource):
567
568
  "location": "earth",
568
569
  })
569
570
  ```
571
+ <!--End PulumiCodeChooser -->
570
572
 
571
573
  Example using `kubernetes_role_name` mode:
572
574
 
575
+ <!--Start PulumiCodeChooser -->
573
576
  ```python
574
577
  import pulumi
575
578
  import pulumi_vault as vault
@@ -596,9 +599,11 @@ class SecretBackendRole(pulumi.CustomResource):
596
599
  "location": "earth",
597
600
  })
598
601
  ```
602
+ <!--End PulumiCodeChooser -->
599
603
 
600
604
  Example using `generated_role_rules` mode:
601
605
 
606
+ <!--Start PulumiCodeChooser -->
602
607
  ```python
603
608
  import pulumi
604
609
  import pulumi_vault as vault
@@ -630,12 +635,13 @@ class SecretBackendRole(pulumi.CustomResource):
630
635
  "location": "earth",
631
636
  })
632
637
  ```
638
+ <!--End PulumiCodeChooser -->
633
639
 
634
640
  ## Import
635
641
 
636
642
  The Kubernetes secret backend role can be imported using the full path to the role
637
643
 
638
- of the form: `<backend_path>/roles/<role_name>` e.g.
644
+ of the form: `<backend_path>/roles/<role_name>` e.g.
639
645
 
640
646
  ```sh
641
647
  $ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
@@ -687,6 +693,7 @@ class SecretBackendRole(pulumi.CustomResource):
687
693
 
688
694
  Example using `service_account_name` mode:
689
695
 
696
+ <!--Start PulumiCodeChooser -->
690
697
  ```python
691
698
  import pulumi
692
699
  import pulumi_vault as vault
@@ -713,9 +720,11 @@ class SecretBackendRole(pulumi.CustomResource):
713
720
  "location": "earth",
714
721
  })
715
722
  ```
723
+ <!--End PulumiCodeChooser -->
716
724
 
717
725
  Example using `kubernetes_role_name` mode:
718
726
 
727
+ <!--Start PulumiCodeChooser -->
719
728
  ```python
720
729
  import pulumi
721
730
  import pulumi_vault as vault
@@ -742,9 +751,11 @@ class SecretBackendRole(pulumi.CustomResource):
742
751
  "location": "earth",
743
752
  })
744
753
  ```
754
+ <!--End PulumiCodeChooser -->
745
755
 
746
756
  Example using `generated_role_rules` mode:
747
757
 
758
+ <!--Start PulumiCodeChooser -->
748
759
  ```python
749
760
  import pulumi
750
761
  import pulumi_vault as vault
@@ -776,12 +787,13 @@ class SecretBackendRole(pulumi.CustomResource):
776
787
  "location": "earth",
777
788
  })
778
789
  ```
790
+ <!--End PulumiCodeChooser -->
779
791
 
780
792
  ## Import
781
793
 
782
794
  The Kubernetes secret backend role can be imported using the full path to the role
783
795
 
784
- of the form: `<backend_path>/roles/<role_name>` e.g.
796
+ of the form: `<backend_path>/roles/<role_name>` e.g.
785
797
 
786
798
  ```sh
787
799
  $ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
@@ -134,6 +134,7 @@ def get_secret(namespace: Optional[str] = None,
134
134
  """
135
135
  ## Example Usage
136
136
 
137
+ <!--Start PulumiCodeChooser -->
137
138
  ```python
138
139
  import pulumi
139
140
  import json
@@ -154,6 +155,8 @@ def get_secret(namespace: Optional[str] = None,
154
155
  }))
155
156
  secret_data = vault.kv.get_secret_output(path=secret.path)
156
157
  ```
158
+ <!--End PulumiCodeChooser -->
159
+
157
160
  ## Required Vault Capabilities
158
161
 
159
162
  Use of this resource requires the `read` capability on the given path.
@@ -189,6 +192,7 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
189
192
  """
190
193
  ## Example Usage
191
194
 
195
+ <!--Start PulumiCodeChooser -->
192
196
  ```python
193
197
  import pulumi
194
198
  import json
@@ -209,6 +213,8 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
209
213
  }))
210
214
  secret_data = vault.kv.get_secret_output(path=secret.path)
211
215
  ```
216
+ <!--End PulumiCodeChooser -->
217
+
212
218
  ## Required Vault Capabilities
213
219
 
214
220
  Use of this resource requires the `read` capability on the given path.
@@ -134,6 +134,7 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
134
134
  """
135
135
  ## Example Usage
136
136
 
137
+ <!--Start PulumiCodeChooser -->
137
138
  ```python
138
139
  import pulumi
139
140
  import json
@@ -155,6 +156,8 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
155
156
  test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
156
157
  name=aws_secret.name)
157
158
  ```
159
+ <!--End PulumiCodeChooser -->
160
+
158
161
  ## Required Vault Capabilities
159
162
 
160
163
  Use of this resource requires the `read` capability on the given path.
@@ -207,6 +210,7 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
207
210
  """
208
211
  ## Example Usage
209
212
 
213
+ <!--Start PulumiCodeChooser -->
210
214
  ```python
211
215
  import pulumi
212
216
  import json
@@ -228,6 +232,8 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
228
232
  test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
229
233
  name=aws_secret.name)
230
234
  ```
235
+ <!--End PulumiCodeChooser -->
236
+
231
237
  ## Required Vault Capabilities
232
238
 
233
239
  Use of this resource requires the `read` capability on the given path.
@@ -174,9 +174,7 @@ def get_secret_v2(mount: Optional[str] = None,
174
174
  version: Optional[int] = None,
175
175
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretV2Result:
176
176
  """
177
- ## Required Vault Capabilities
178
-
179
- Use of this resource requires the `read` capability on the given path.
177
+ ## Example Usage
180
178
 
181
179
 
182
180
  :param str mount: Path where KV-V2 engine is mounted.
@@ -220,9 +218,7 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
220
218
  version: Optional[pulumi.Input[Optional[int]]] = None,
221
219
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretV2Result]:
222
220
  """
223
- ## Required Vault Capabilities
224
-
225
- Use of this resource requires the `read` capability on the given path.
221
+ ## Example Usage
226
222
 
227
223
 
228
224
  :param str mount: Path where KV-V2 engine is mounted.
@@ -80,6 +80,7 @@ def get_secrets_list(namespace: Optional[str] = None,
80
80
  """
81
81
  ## Example Usage
82
82
 
83
+ <!--Start PulumiCodeChooser -->
83
84
  ```python
84
85
  import pulumi
85
86
  import json
@@ -104,6 +105,8 @@ def get_secrets_list(namespace: Optional[str] = None,
104
105
  }))
105
106
  secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
106
107
  ```
108
+ <!--End PulumiCodeChooser -->
109
+
107
110
  ## Required Vault Capabilities
108
111
 
109
112
  Use of this resource requires the `read` capability on the given path.
@@ -135,6 +138,7 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
135
138
  """
136
139
  ## Example Usage
137
140
 
141
+ <!--Start PulumiCodeChooser -->
138
142
  ```python
139
143
  import pulumi
140
144
  import json
@@ -159,6 +163,8 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
159
163
  }))
160
164
  secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
161
165
  ```
166
+ <!--End PulumiCodeChooser -->
167
+
162
168
  ## Required Vault Capabilities
163
169
 
164
170
  Use of this resource requires the `read` capability on the given path.
@@ -102,6 +102,7 @@ def get_secrets_list_v2(mount: Optional[str] = None,
102
102
  """
103
103
  ## Example Usage
104
104
 
105
+ <!--Start PulumiCodeChooser -->
105
106
  ```python
106
107
  import pulumi
107
108
  import json
@@ -133,6 +134,8 @@ def get_secrets_list_v2(mount: Optional[str] = None,
133
134
  nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
134
135
  name=vault_kv_secret_v2["test_2"]["name"]))
135
136
  ```
137
+ <!--End PulumiCodeChooser -->
138
+
136
139
  ## Required Vault Capabilities
137
140
 
138
141
  Use of this resource requires the `read` capability on the given path.
@@ -172,6 +175,7 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
172
175
  """
173
176
  ## Example Usage
174
177
 
178
+ <!--Start PulumiCodeChooser -->
175
179
  ```python
176
180
  import pulumi
177
181
  import json
@@ -203,6 +207,8 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
203
207
  nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
204
208
  name=vault_kv_secret_v2["test_2"]["name"]))
205
209
  ```
210
+ <!--End PulumiCodeChooser -->
211
+
206
212
  ## Required Vault Capabilities
207
213
 
208
214
  Use of this resource requires the `read` capability on the given path.
pulumi_vault/kv/secret.py CHANGED
@@ -176,6 +176,7 @@ class Secret(pulumi.CustomResource):
176
176
 
177
177
  ## Example Usage
178
178
 
179
+ <!--Start PulumiCodeChooser -->
179
180
  ```python
180
181
  import pulumi
181
182
  import json
@@ -195,6 +196,8 @@ class Secret(pulumi.CustomResource):
195
196
  "foo": "bar",
196
197
  }))
197
198
  ```
199
+ <!--End PulumiCodeChooser -->
200
+
198
201
  ## Required Vault Capabilities
199
202
 
200
203
  Use of this resource requires the `create` or `update` capability
@@ -207,7 +210,7 @@ class Secret(pulumi.CustomResource):
207
210
  KV-V1 secrets can be imported using the `path`, e.g.
208
211
 
209
212
  ```sh
210
- $ pulumi import vault:kv/secret:Secret secret kvv1/secret
213
+ $ pulumi import vault:kv/secret:Secret secret kvv1/secret
211
214
  ```
212
215
 
213
216
  :param str resource_name: The name of the resource.
@@ -234,6 +237,7 @@ class Secret(pulumi.CustomResource):
234
237
 
235
238
  ## Example Usage
236
239
 
240
+ <!--Start PulumiCodeChooser -->
237
241
  ```python
238
242
  import pulumi
239
243
  import json
@@ -253,6 +257,8 @@ class Secret(pulumi.CustomResource):
253
257
  "foo": "bar",
254
258
  }))
255
259
  ```
260
+ <!--End PulumiCodeChooser -->
261
+
256
262
  ## Required Vault Capabilities
257
263
 
258
264
  Use of this resource requires the `create` or `update` capability
@@ -265,7 +271,7 @@ class Secret(pulumi.CustomResource):
265
271
  KV-V1 secrets can be imported using the `path`, e.g.
266
272
 
267
273
  ```sh
268
- $ pulumi import vault:kv/secret:Secret secret kvv1/secret
274
+ $ pulumi import vault:kv/secret:Secret secret kvv1/secret
269
275
  ```
270
276
 
271
277
  :param str resource_name: The name of the resource.
@@ -226,6 +226,7 @@ class SecretBackendV2(pulumi.CustomResource):
226
226
 
227
227
  ## Example Usage
228
228
 
229
+ <!--Start PulumiCodeChooser -->
229
230
  ```python
230
231
  import pulumi
231
232
  import pulumi_vault as vault
@@ -243,6 +244,8 @@ class SecretBackendV2(pulumi.CustomResource):
243
244
  delete_version_after=12600,
244
245
  cas_required=True)
245
246
  ```
247
+ <!--End PulumiCodeChooser -->
248
+
246
249
  ## Required Vault Capabilities
247
250
 
248
251
  Use of this resource requires the `create` or `update` capability
@@ -252,10 +255,11 @@ class SecretBackendV2(pulumi.CustomResource):
252
255
 
253
256
  ## Import
254
257
 
255
- The KV-V2 secret backend can be imported using its unique ID, the `${mount}/config`, e.g.
258
+ The KV-V2 secret backend can be imported using its unique ID,
259
+ the `${mount}/config`, e.g.
256
260
 
257
261
  ```sh
258
- $ pulumi import vault:kv/secretBackendV2:SecretBackendV2 example kvv2/config
262
+ $ pulumi import vault:kv/secretBackendV2:SecretBackendV2 example kvv2/config
259
263
  ```
260
264
 
261
265
  :param str resource_name: The name of the resource.
@@ -286,6 +290,7 @@ class SecretBackendV2(pulumi.CustomResource):
286
290
 
287
291
  ## Example Usage
288
292
 
293
+ <!--Start PulumiCodeChooser -->
289
294
  ```python
290
295
  import pulumi
291
296
  import pulumi_vault as vault
@@ -303,6 +308,8 @@ class SecretBackendV2(pulumi.CustomResource):
303
308
  delete_version_after=12600,
304
309
  cas_required=True)
305
310
  ```
311
+ <!--End PulumiCodeChooser -->
312
+
306
313
  ## Required Vault Capabilities
307
314
 
308
315
  Use of this resource requires the `create` or `update` capability
@@ -312,10 +319,11 @@ class SecretBackendV2(pulumi.CustomResource):
312
319
 
313
320
  ## Import
314
321
 
315
- The KV-V2 secret backend can be imported using its unique ID, the `${mount}/config`, e.g.
322
+ The KV-V2 secret backend can be imported using its unique ID,
323
+ the `${mount}/config`, e.g.
316
324
 
317
325
  ```sh
318
- $ pulumi import vault:kv/secretBackendV2:SecretBackendV2 example kvv2/config
326
+ $ pulumi import vault:kv/secretBackendV2:SecretBackendV2 example kvv2/config
319
327
  ```
320
328
 
321
329
  :param str resource_name: The name of the resource.
@@ -448,6 +448,7 @@ class SecretV2(pulumi.CustomResource):
448
448
 
449
449
  ## Example Usage
450
450
 
451
+ <!--Start PulumiCodeChooser -->
451
452
  ```python
452
453
  import pulumi
453
454
  import json
@@ -476,6 +477,8 @@ class SecretV2(pulumi.CustomResource):
476
477
  },
477
478
  ))
478
479
  ```
480
+ <!--End PulumiCodeChooser -->
481
+
479
482
  ## Required Vault Capabilities
480
483
 
481
484
  Use of this resource requires the `create` or `update` capability
@@ -500,7 +503,7 @@ class SecretV2(pulumi.CustomResource):
500
503
  KV-V2 secrets can be imported using the `path`, e.g.
501
504
 
502
505
  ```sh
503
- $ pulumi import vault:kv/secretV2:SecretV2 example kvv2/data/secret
506
+ $ pulumi import vault:kv/secretV2:SecretV2 example kvv2/data/secret
504
507
  ```
505
508
 
506
509
  :param str resource_name: The name of the resource.
@@ -543,6 +546,7 @@ class SecretV2(pulumi.CustomResource):
543
546
 
544
547
  ## Example Usage
545
548
 
549
+ <!--Start PulumiCodeChooser -->
546
550
  ```python
547
551
  import pulumi
548
552
  import json
@@ -571,6 +575,8 @@ class SecretV2(pulumi.CustomResource):
571
575
  },
572
576
  ))
573
577
  ```
578
+ <!--End PulumiCodeChooser -->
579
+
574
580
  ## Required Vault Capabilities
575
581
 
576
582
  Use of this resource requires the `create` or `update` capability
@@ -595,7 +601,7 @@ class SecretV2(pulumi.CustomResource):
595
601
  KV-V2 secrets can be imported using the `path`, e.g.
596
602
 
597
603
  ```sh
598
- $ pulumi import vault:kv/secretV2:SecretV2 example kvv2/data/secret
604
+ $ pulumi import vault:kv/secretV2:SecretV2 example kvv2/data/secret
599
605
  ```
600
606
 
601
607
  :param str resource_name: The name of the resource.
@@ -1330,6 +1330,7 @@ class AuthBackend(pulumi.CustomResource):
1330
1330
 
1331
1331
  ## Example Usage
1332
1332
 
1333
+ <!--Start PulumiCodeChooser -->
1333
1334
  ```python
1334
1335
  import pulumi
1335
1336
  import pulumi_vault as vault
@@ -1344,13 +1345,14 @@ class AuthBackend(pulumi.CustomResource):
1344
1345
  userattr="sAMAccountName",
1345
1346
  userdn="OU=Users,OU=Accounts,DC=example,DC=org")
1346
1347
  ```
1348
+ <!--End PulumiCodeChooser -->
1347
1349
 
1348
1350
  ## Import
1349
1351
 
1350
1352
  LDAP authentication backends can be imported using the `path`, e.g.
1351
1353
 
1352
1354
  ```sh
1353
- $ pulumi import vault:ldap/authBackend:AuthBackend ldap ldap
1355
+ $ pulumi import vault:ldap/authBackend:AuthBackend ldap ldap
1354
1356
  ```
1355
1357
 
1356
1358
  :param str resource_name: The name of the resource.
@@ -1420,6 +1422,7 @@ class AuthBackend(pulumi.CustomResource):
1420
1422
 
1421
1423
  ## Example Usage
1422
1424
 
1425
+ <!--Start PulumiCodeChooser -->
1423
1426
  ```python
1424
1427
  import pulumi
1425
1428
  import pulumi_vault as vault
@@ -1434,13 +1437,14 @@ class AuthBackend(pulumi.CustomResource):
1434
1437
  userattr="sAMAccountName",
1435
1438
  userdn="OU=Users,OU=Accounts,DC=example,DC=org")
1436
1439
  ```
1440
+ <!--End PulumiCodeChooser -->
1437
1441
 
1438
1442
  ## Import
1439
1443
 
1440
1444
  LDAP authentication backends can be imported using the `path`, e.g.
1441
1445
 
1442
1446
  ```sh
1443
- $ pulumi import vault:ldap/authBackend:AuthBackend ldap ldap
1447
+ $ pulumi import vault:ldap/authBackend:AuthBackend ldap ldap
1444
1448
  ```
1445
1449
 
1446
1450
  :param str resource_name: The name of the resource.
@@ -189,6 +189,7 @@ class AuthBackendGroup(pulumi.CustomResource):
189
189
 
190
190
  ## Example Usage
191
191
 
192
+ <!--Start PulumiCodeChooser -->
192
193
  ```python
193
194
  import pulumi
194
195
  import pulumi_vault as vault
@@ -207,13 +208,14 @@ class AuthBackendGroup(pulumi.CustomResource):
207
208
  policies=["dba"],
208
209
  backend=ldap.path)
209
210
  ```
211
+ <!--End PulumiCodeChooser -->
210
212
 
211
213
  ## Import
212
214
 
213
215
  LDAP authentication backend groups can be imported using the `path`, e.g.
214
216
 
215
217
  ```sh
216
- $ pulumi import vault:ldap/authBackendGroup:AuthBackendGroup foo auth/ldap/groups/foo
218
+ $ pulumi import vault:ldap/authBackendGroup:AuthBackendGroup foo auth/ldap/groups/foo
217
219
  ```
218
220
 
219
221
  :param str resource_name: The name of the resource.
@@ -239,6 +241,7 @@ class AuthBackendGroup(pulumi.CustomResource):
239
241
 
240
242
  ## Example Usage
241
243
 
244
+ <!--Start PulumiCodeChooser -->
242
245
  ```python
243
246
  import pulumi
244
247
  import pulumi_vault as vault
@@ -257,13 +260,14 @@ class AuthBackendGroup(pulumi.CustomResource):
257
260
  policies=["dba"],
258
261
  backend=ldap.path)
259
262
  ```
263
+ <!--End PulumiCodeChooser -->
260
264
 
261
265
  ## Import
262
266
 
263
267
  LDAP authentication backend groups can be imported using the `path`, e.g.
264
268
 
265
269
  ```sh
266
- $ pulumi import vault:ldap/authBackendGroup:AuthBackendGroup foo auth/ldap/groups/foo
270
+ $ pulumi import vault:ldap/authBackendGroup:AuthBackendGroup foo auth/ldap/groups/foo
267
271
  ```
268
272
 
269
273
  :param str resource_name: The name of the resource.
@@ -222,6 +222,7 @@ class AuthBackendUser(pulumi.CustomResource):
222
222
 
223
223
  ## Example Usage
224
224
 
225
+ <!--Start PulumiCodeChooser -->
225
226
  ```python
226
227
  import pulumi
227
228
  import pulumi_vault as vault
@@ -243,13 +244,14 @@ class AuthBackendUser(pulumi.CustomResource):
243
244
  ],
244
245
  backend=ldap.path)
245
246
  ```
247
+ <!--End PulumiCodeChooser -->
246
248
 
247
249
  ## Import
248
250
 
249
251
  LDAP authentication backend users can be imported using the `path`, e.g.
250
252
 
251
253
  ```sh
252
- $ pulumi import vault:ldap/authBackendUser:AuthBackendUser foo auth/ldap/users/foo
254
+ $ pulumi import vault:ldap/authBackendUser:AuthBackendUser foo auth/ldap/users/foo
253
255
  ```
254
256
 
255
257
  :param str resource_name: The name of the resource.
@@ -276,6 +278,7 @@ class AuthBackendUser(pulumi.CustomResource):
276
278
 
277
279
  ## Example Usage
278
280
 
281
+ <!--Start PulumiCodeChooser -->
279
282
  ```python
280
283
  import pulumi
281
284
  import pulumi_vault as vault
@@ -297,13 +300,14 @@ class AuthBackendUser(pulumi.CustomResource):
297
300
  ],
298
301
  backend=ldap.path)
299
302
  ```
303
+ <!--End PulumiCodeChooser -->
300
304
 
301
305
  ## Import
302
306
 
303
307
  LDAP authentication backend users can be imported using the `path`, e.g.
304
308
 
305
309
  ```sh
306
- $ pulumi import vault:ldap/authBackendUser:AuthBackendUser foo auth/ldap/users/foo
310
+ $ pulumi import vault:ldap/authBackendUser:AuthBackendUser foo auth/ldap/users/foo
307
311
  ```
308
312
 
309
313
  :param str resource_name: The name of the resource.